Analysis
-
max time kernel
162s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 07:55
Static task
static1
Behavioral task
behavioral1
Sample
106162a9e72052611f27b255db7a5d53.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
106162a9e72052611f27b255db7a5d53.exe
Resource
win10v2004-20231215-en
General
-
Target
106162a9e72052611f27b255db7a5d53.exe
-
Size
10.7MB
-
MD5
106162a9e72052611f27b255db7a5d53
-
SHA1
b2c8f9a1c6cd769bdad4d45b3e340b28e0bb2092
-
SHA256
0bd0d596230aa3958d9f54bd43d3de94685dd9f7ed3e8bd0b5c1a01d48d7e34e
-
SHA512
0b5966e406ba6c3d861e5b982a539a51c836a8fb08fd1c9295f17c108d29ae72ad687689eadb9fe3540924afab949598dd6f2108f7498d79edffa2a93a7b9ec9
-
SSDEEP
49152:3nHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH:3
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4784 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\kucdgdbd\ImagePath = "C:\\Windows\\SysWOW64\\kucdgdbd\\hbdgzyy.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 106162a9e72052611f27b255db7a5d53.exe -
Deletes itself 1 IoCs
pid Process 4156 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1800 hbdgzyy.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1800 set thread context of 4156 1800 hbdgzyy.exe 110 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3388 sc.exe 3508 sc.exe 1764 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3732 2532 WerFault.exe 90 1196 1800 WerFault.exe 106 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2532 wrote to memory of 1320 2532 106162a9e72052611f27b255db7a5d53.exe 95 PID 2532 wrote to memory of 1320 2532 106162a9e72052611f27b255db7a5d53.exe 95 PID 2532 wrote to memory of 1320 2532 106162a9e72052611f27b255db7a5d53.exe 95 PID 2532 wrote to memory of 1976 2532 106162a9e72052611f27b255db7a5d53.exe 98 PID 2532 wrote to memory of 1976 2532 106162a9e72052611f27b255db7a5d53.exe 98 PID 2532 wrote to memory of 1976 2532 106162a9e72052611f27b255db7a5d53.exe 98 PID 2532 wrote to memory of 3388 2532 106162a9e72052611f27b255db7a5d53.exe 100 PID 2532 wrote to memory of 3388 2532 106162a9e72052611f27b255db7a5d53.exe 100 PID 2532 wrote to memory of 3388 2532 106162a9e72052611f27b255db7a5d53.exe 100 PID 2532 wrote to memory of 3508 2532 106162a9e72052611f27b255db7a5d53.exe 102 PID 2532 wrote to memory of 3508 2532 106162a9e72052611f27b255db7a5d53.exe 102 PID 2532 wrote to memory of 3508 2532 106162a9e72052611f27b255db7a5d53.exe 102 PID 2532 wrote to memory of 1764 2532 106162a9e72052611f27b255db7a5d53.exe 104 PID 2532 wrote to memory of 1764 2532 106162a9e72052611f27b255db7a5d53.exe 104 PID 2532 wrote to memory of 1764 2532 106162a9e72052611f27b255db7a5d53.exe 104 PID 1800 wrote to memory of 4156 1800 hbdgzyy.exe 110 PID 1800 wrote to memory of 4156 1800 hbdgzyy.exe 110 PID 1800 wrote to memory of 4156 1800 hbdgzyy.exe 110 PID 1800 wrote to memory of 4156 1800 hbdgzyy.exe 110 PID 1800 wrote to memory of 4156 1800 hbdgzyy.exe 110 PID 2532 wrote to memory of 4784 2532 106162a9e72052611f27b255db7a5d53.exe 108 PID 2532 wrote to memory of 4784 2532 106162a9e72052611f27b255db7a5d53.exe 108 PID 2532 wrote to memory of 4784 2532 106162a9e72052611f27b255db7a5d53.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\106162a9e72052611f27b255db7a5d53.exe"C:\Users\Admin\AppData\Local\Temp\106162a9e72052611f27b255db7a5d53.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\kucdgdbd\2⤵PID:1320
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\hbdgzyy.exe" C:\Windows\SysWOW64\kucdgdbd\2⤵PID:1976
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create kucdgdbd binPath= "C:\Windows\SysWOW64\kucdgdbd\hbdgzyy.exe /d\"C:\Users\Admin\AppData\Local\Temp\106162a9e72052611f27b255db7a5d53.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3388
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description kucdgdbd "wifi internet conection"2⤵
- Launches sc.exe
PID:3508
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start kucdgdbd2⤵
- Launches sc.exe
PID:1764
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 8082⤵
- Program crash
PID:3732
-
-
C:\Windows\SysWOW64\kucdgdbd\hbdgzyy.exeC:\Windows\SysWOW64\kucdgdbd\hbdgzyy.exe /d"C:\Users\Admin\AppData\Local\Temp\106162a9e72052611f27b255db7a5d53.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 5162⤵
- Program crash
PID:1196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1800 -ip 18001⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2532 -ip 25321⤵PID:1212
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.0MB
MD5460e1aea8b21a54e4cc80f3a556feb38
SHA17f13d6724be2f742088671340671a7e93d22ae4b
SHA2566c95b5fe8b7b53c880bd7cb53ce1cb8330579d31f114066bcadf51d31eb025d3
SHA51233885448113e774704436fe74d114eb9b3faf747dc0314636ad539bec7ba7a1fa9a718655911cb951cdfed080722c013d6e9dfbcb992bfede9c740c09039fc5f
-
Filesize
2.0MB
MD5527cec11aa05d2c63cd1b6f81be78b2a
SHA1a342ab4f07b1b4b99735a1f51958987d2340ca11
SHA256407467cba3b16aa396e2debe32b679de8ef6ca827cf8a33f122e9e45038d5fc9
SHA512562c66aca2c0eb69aaa50fed43e5bfb212c70f06c3e5dcb1ae4d613dafd41512b5671e192cbeda4236fbed534b3bc55ecc5132cd7b6a2196f07e496eef543416